Security

Security is paramount in this day and age of breaches and compromises. Much of that burden falls on the shoulders of IT admins. By controlling user accesses, security can be improved exponentially.

BEST PRACTICES

Password Rotation: Why and How to Implement

Why password rotation? No longer does Fred’s Facebook password also get you access to critical IT resources. IT admins can breathe a sigh of relief.

DEVICE MANAGEMENT

BYOD Security: Making Macs Secure

Secure IT management of a BYOD workplace with a directory that treats Macs like first class citizens. Learn about BYOD security for Mac devices.

SECURITY

Own Your Identity

Blindly granting control of your online identity to other companies is flawed. It’s important to own your identity online. Let me explain why and how.

SECURITY

Password Requirements

There is a lot of debate in the Identity Management world as to whether increasing the complexity or length of password requirements makes a difference.

SECURITY

Three Ways to Secure Wireless Networks

In this article we discuss the three primary ways that most people use to secure wireless networks and the pros and cons of each method.

BEST PRACTICES

End User Password Reset

It’s easy for an exec to get locked out of an account, but for you it's a needless distraction. DaaS solves two main issues that cause password problems.

BEST PRACTICES

Wireless Security through RADIUS and LDAP

Most networks these days are wireless — it’s easier to manage, offers greater mobility, and is cheaper. But wireless networks are also vulnerable to attack.

CLOUD INFRASTRUCTURE

Ubiquitous IT

There are four ingredients to building a ubiquitous IT environment: 1. Cloud-based 2. Mobile 3. Security 4. Identity. Now we'll discuss each in detail.

ACTIVE DIRECTORY

The Problems with LDAP and AD User Management

Directories are complex software. The two current main solutions are Microsoft AD and OpenLDAP, but there are problems with LDAP and AD user management.

BEST PRACTICES

Server Security in 3 Steps

In this post, we highlight three steps to ensure you are securing your servers and significantly protecting your infrastructure from being compromised.